Movatterモバイル変換


[0]ホーム

URL:


US20010037450A1 - System and method for process protection - Google Patents

System and method for process protection
Download PDF

Info

Publication number
US20010037450A1
US20010037450A1US09/797,108US79710801AUS2001037450A1US 20010037450 A1US20010037450 A1US 20010037450A1US 79710801 AUS79710801 AUS 79710801AUS 2001037450 A1US2001037450 A1US 2001037450A1
Authority
US
United States
Prior art keywords
code
trusted module
protected
host computer
word
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/797,108
Inventor
Evgueny Metlitski
Dmitry Utyansky
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US09/797,108priorityCriticalpatent/US20010037450A1/en
Publication of US20010037450A1publicationCriticalpatent/US20010037450A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method of developing a protected software application comprises identifying segments of the application to be protected and compiling those segments according to a protected instruction set. The protected segments are then linked together with the unprotected segments for distribution. The protected segments can only be executed using a trusted module connected to a computing device. The trusted module comprises a virtual machine programmed with an instruction set corresponding to the set of instructions used to compile the protected segments. Using the trusted module, the state vector of the process of execution is monitored to insure integrity of the process. Various encryption and technological security measure may also be used.

Description

Claims (38)

We claim:
1. A method of securely executing a software application on a host computer and coprocessor, the method comprising:
selecting a first set of segments of the software application to be executed on an open architecture system;
selecting a second set of segments of the software application to be executed only by a closed architecture system;
compiling the first set of segments using a first compiler into a first set of code;
compiling the second set of segments using a second compiler into a second set of code;
linking the first and second sets of code;
executing the first set of code on the open architecture system of the host computer; and
executing the second set of code only on the closed architecture system of the coprocessor.
2. The method of
claim 1
, wherein the step of processing the software application further comprises processing results of the execution of the first and second sets of code through interaction between the host computer and the coprocessor.
3. The method of
claim 1
, wherein the step of processing the software application further comprises:
storing at least the second set of code in a memory of the host computer;
transmitting a portion of the second set of code to the coprocessor; and
interpreting the portion of the second set of code in the coprocessor.
4. The method of
claim 3
, wherein the transmitting of the portion of the second set code to the coprocessor comprises transmitting the portion of the second set of code in a ciphered form.
5. The method of
claim 4
, wherein the interpreting of the portion of the second set of code comprises deciphering the portion of the second set of code.
6. The method of
claim 3
, wherein the transmitting of the portion of the second set of code comprises transmitting the portion of the second set of code in a word-by-word mode and the interpreting of the portion of the second set of code comprises interpreting the portion of the second set of code in a word-by-word mode.
7. The method of
claim 6
, wherein the transmitting of the portion of the second set of code in a word-by-word mode further comprises:
receiving a word of the portion of the second set of code in a ciphered form; and
deciphering the word using a key stored in a memory of the coprocessor.
8. The method of
claim 7
, wherein a memory address of the word is used as an additional key.
9. The method of
claim 6
, wherein the transmitting of the portion of the second set of code in a word-by-word mode further comprises scrambling a memory address of the word.
10. The method of
claim 6
, wherein the transmitting of the portion of the second set of code in a word-by-word mode further comprises inserting randomly generated requests to the memory of the host computer by the coprocessor.
11. The method of
claim 3
, wherein the transmitting of the portion of the second set of code comprises transmitting the portion of the second set of code in segments and the interpreting of the portion of the second set of code comprises interpreting the portion of the second set of code in a segment-by-segment mode.
12. The method of
claim 11
, wherein the transmitting of the portion of the second set of code in segments further comprises:
transmitting an authorization code along with each of the segments; and
checking the authorization code upon receipt of one of the segments in the coprocessor.
13. The method of
claim 1
, further comprising enciphering the second set of code using a key corresponding to a key stored in a memory of the coprocessor.
14. The method of
claim 1
, further comprising storing the linked first and second sets of code on a machine readable storage device.
15. The method of
claim 1
, further comprising making the linked first and second sets of code accessible from a remote location.
16. The method of
claim 1
, further comprising checking a time period during processing between issuance of a request by the coprocessor and fulfillment of the request by the host computer.
17. The method of
claim 16
, wherein the time period is measure by a clock integrated within the coprocessor.
18. The method of
claim 1
, further comprising matching a time value of a clock of the coprocessor with a time value of a clock of the host computer during processing.
19. The method of
claim 1
, further comprising calculating a time of usage of the software application using a clock of the coprocessor.
20. A system for securely executing a protected application, a first portion of the protected application compiled using an open architecture instruction set and a second portion of the protected application compiled using a protected instruction set, the system comprising:
a host computer programmed with the open architecture instruction set so as to be capable of executing only the first portion of the protected application; and
a trusted module communicatively connected to the host computer, the trusted module having a coprocessor programmed with the protected instruction set so as to be capable of executing the second portion of the protected application;
wherein the protected application is processed through execution of the second portion of the protected application on the trusted module and execution of the first portion of the protected application on the host computer.
21. The system of
claim 20
, wherein the coprocessor of the trusted module is further programmed with a second open architecture instruction set.
22. The system of
claim 20
, wherein the protected application is stored on the host computer and segments of the second portion of the protected application are transmitted to the trusted module in response to requests for the segments by the trusted module
23. The system of
claim 22
, wherein the protected application is stored in an enciphered form.
24. The system of
claim 22
, wherein the segments are transmitted to the trusted module in an enciphered form.
25. The system of
claim 22
, wherein the segments are transmitted to the trusted module along with authorization codes and the trusted module checks the authorization codes.
26. The system of
claim 20
, wherein the protected application is stored on the host computer and the second portion of the protected application is transmitted to the trusted module in word by word.
27. The system of
claim 26
, wherein the protected application is stored in an enciphered form.
28. The system of
claim 26
, wherein each word transmitted to the trusted module is in an enciphered form.
29. The system of
claim 26
, wherein each word is transmitted to the trusted module along with an authorization code and the trusted module checks the authorization code.
30. The system of
claim 20
, wherein the trusted module further comprises:
a communication interface for communicating with the host computer;
a memory for storing keys for deciphering the second portion of the protected application; and
a clock.
31. The system of
claim 30
, wherein the communication interface is a universal serial bus.
32. The system of
claim 30
, wherein the communication interface is a parallel port.
33. The system of
claim 32
, wherein the parallel port is on the IEEE-1284 type.
34. The system of
claim 30
, wherein the memory is a non-volatile memory.
35. The system of
claim 30
, wherein the keys stored in the memory match keys used to encipher the second portion of the protected application.
36. The system of
claim 30
, wherein the clock checks a time interval spent by the host computer to execute requests of the trusted module.
37. The system of
claim 30
, wherein the coprocessor limits usage of the protected application based on a time value measured by the clock.
38. The system of
claim 37
, wherein the time value is predefined.
US09/797,1082000-03-022001-03-01System and method for process protectionAbandonedUS20010037450A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US09/797,108US20010037450A1 (en)2000-03-022001-03-01System and method for process protection

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US18653800P2000-03-022000-03-02
US09/797,108US20010037450A1 (en)2000-03-022001-03-01System and method for process protection

Publications (1)

Publication NumberPublication Date
US20010037450A1true US20010037450A1 (en)2001-11-01

Family

ID=22685342

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US09/797,108AbandonedUS20010037450A1 (en)2000-03-022001-03-01System and method for process protection

Country Status (3)

CountryLink
US (1)US20010037450A1 (en)
AU (1)AU2001243365A1 (en)
WO (1)WO2001065366A1 (en)

Cited By (187)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020120862A1 (en)*2001-02-232002-08-29Hewlett-Packard CompanyInformation system
US20020120578A1 (en)*2000-11-222002-08-29Sy Bon K.Time-based software licensing approach
US20020119427A1 (en)*2001-02-232002-08-29Hewlett-Packard CompanyTrusted computing environment
US20020124052A1 (en)*2001-02-172002-09-05Richard BrownSecure e-mail handling using a compartmented operating system
US6470430B1 (en)*1999-06-172002-10-22Daimlerchrysler AgPartitioning and monitoring of software-controlled system
US20020188859A1 (en)*2001-06-072002-12-12Dollens James TerryDNA intrusion detection method
US20020194132A1 (en)*2001-06-192002-12-19Hewlett-Packard CompanyRenting a computing environment on a trusted computing platform
US20020194241A1 (en)*2001-06-192002-12-19Jonathan GriffinPerforming secure and insecure computing operations in a compartmented operating system
US20020194496A1 (en)*2001-06-192002-12-19Jonathan GriffinMultiple trusted computing environments
US6507904B1 (en)2000-03-312003-01-14Intel CorporationExecuting isolated mode instructions in a secure system running in privilege rings
US20030028788A1 (en)*2001-08-012003-02-06Cuenod Jean-Christophe EmanuelMethod to protect software against unwanted use with a " elementary functions " principle
US20030041255A1 (en)*2001-07-312003-02-27Liqun ChenMethod and apparatus for locking an application within a trusted environment
US20030110387A1 (en)*2001-12-062003-06-12Cowie Neil AndrewInitiating execution of a computer program from an encrypted version of a computer program
WO2003027800A3 (en)*2001-09-242003-07-31Motorola IncMethod and apparatus for secure mobile transaction
US20030221116A1 (en)*2002-04-152003-11-27Core Sdi, IncorporatedSecurity framework for protecting rights in computer software
US6658571B1 (en)*1999-02-092003-12-02Secure Computing CorporationSecurity framework for dynamically wrapping software applications executing in a computing system
US6678825B1 (en)2000-03-312004-01-13Intel CorporationControlling access to multiple isolated memories in an isolated execution environment
US6754815B1 (en)2000-03-312004-06-22Intel CorporationMethod and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
US20040123288A1 (en)*2002-12-192004-06-24Intel CorporationMethods and systems to manage machine state in virtual machine operations
US6760441B1 (en)2000-03-312004-07-06Intel CorporationGenerating a key hieararchy for use in an isolated execution environment
US6769058B1 (en)2000-03-312004-07-27Intel CorporationResetting a processor in an isolated execution environment
US20040208072A1 (en)*2003-04-182004-10-21Via Technologies Inc.Microprocessor apparatus and method for providing configurable cryptographic key size
US6820177B2 (en)2002-06-122004-11-16Intel CorporationProtected configuration space in a protected environment
US20040228479A1 (en)*2003-04-182004-11-18Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic functions
WO2004051482A3 (en)*2002-12-042004-11-25Philips Intellectual PropertyAddress encryption method for flash memories
US20040250090A1 (en)*2003-04-182004-12-09Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic fuctions
US20040250091A1 (en)*2003-04-182004-12-09Via Technologies Inc.Microprocessor apparatus and method for optimizing block cipher cryptographic functions
US20040255130A1 (en)*2003-04-182004-12-16Via Technologies Inc.Microprocessor apparatus and method for providing configurable cryptographic key size
US20050039080A1 (en)*2003-08-152005-02-17Wenzel Harold MichaelMethod and system for containing software faults
US20050172293A1 (en)*2004-01-272005-08-04Network Appliance, Inc.Method and apparatus for allocating resources in a shared resource processor
WO2005052841A3 (en)*2003-11-262005-08-11IbmTamper-resistant trusted virtual machine
US20050182930A1 (en)*2004-02-182005-08-18AlcatelMethod and a device for transforming an operating system to protect a computer program against attack
US6934817B2 (en)2000-03-312005-08-23Intel CorporationControlling access to multiple memory zones in an isolated execution environment
US6941458B1 (en)2000-03-312005-09-06Intel CorporationManaging a secure platform using a hierarchical executive architecture in isolated execution mode
US20050216749A1 (en)*2004-03-232005-09-29Network Equipment TechnologiesMethod and apparatus for detection of hostile software
US20050216414A1 (en)*2004-03-252005-09-29Nec CorporationSoftware use permission method and system
US20050223221A1 (en)*2001-11-222005-10-06Proudler Graeme JApparatus and method for creating a trusted environment
EP1596530A1 (en)*2004-05-142005-11-16Via Technologies, Inc.Apparatus and method for employing cryptographic functions to generate a message digest
WO2005109145A1 (en)*2004-04-302005-11-17Siemens AktiengesellschaftMethod for preventing a software application or data from being read out of a mobile communication appliance
US6976162B1 (en)2000-06-282005-12-13Intel CorporationPlatform and method for establishing provable identities while maintaining privacy
US20060005000A1 (en)*2004-06-102006-01-05Sun Microsystems, Inc.Enhancing trusted platform module performance
US6990579B1 (en)2000-03-312006-01-24Intel CorporationPlatform and method for remote attestation of a platform
US6996710B1 (en)2000-03-312006-02-07Intel CorporationPlatform and method for issuing and certifying a hardware-protected attestation key
US6996748B2 (en)2002-06-292006-02-07Intel CorporationHandling faults associated with operation of guest software in the virtual-machine architecture
US7013481B1 (en)2000-03-312006-03-14Intel CorporationAttestation key memory device and bus
US7013484B1 (en)2000-03-312006-03-14Intel CorporationManaging a secure environment using a chipset in isolated execution mode
US7020738B2 (en)2000-12-272006-03-28Intel CorporationMethod for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7024555B2 (en)2001-11-012006-04-04Intel CorporationApparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US20060075254A1 (en)*2004-09-272006-04-06Cisco Technology, Inc. (A California Corporation)Smart card functionality from a security co-processor and symmetric key in ROM
US7028149B2 (en)2002-03-292006-04-11Intel CorporationSystem and method for resetting a platform configuration register
US20060095977A1 (en)*2004-08-252006-05-04Samsung Electronics Co., Ltd.Software protecting method and apparatus using the same
US20060099991A1 (en)*2004-11-102006-05-11Intel CorporationMethod and apparatus for detecting and protecting a credential card
US20060107316A1 (en)*2004-11-182006-05-18Michael FiskeDetermining whether to grant access to a passcode protected system
US20060107068A1 (en)*2004-11-182006-05-18Michael FiskeMethod of generating access keys
US20060107312A1 (en)*2004-11-182006-05-18Michael FiskeSystem for handing requests for access to a passcode protected entity
US20060107040A1 (en)*2004-11-182006-05-18Michael FiskeSetting up a security access system
US20060107315A1 (en)*2004-11-182006-05-18Michael FiskeSystem that uses access keys
US7058807B2 (en)2002-04-152006-06-06Intel CorporationValidation of inclusion of a platform within a data center
US20060130130A1 (en)*2004-11-302006-06-15Joshua KablotskyProgrammable processor supporting secure mode
US20060136750A1 (en)*2000-03-272006-06-22Mecrosoft CorporationProtecting Digital Goods Using Oblivious Checking
US7069442B2 (en)2002-03-292006-06-27Intel CorporationSystem and method for execution of a secured environment initialization instruction
US7073042B2 (en)2002-12-122006-07-04Intel CorporationReclaiming existing fields in address translation data structures to extend control over memory accesses
US7073071B1 (en)2000-03-312006-07-04Intel CorporationPlatform and method for generating and utilizing a protected audit log
US7076669B2 (en)2002-04-152006-07-11Intel CorporationMethod and apparatus for communicating securely with a token
US7076655B2 (en)2001-06-192006-07-11Hewlett-Packard Development Company, L.P.Multiple trusted computing environments with verifiable environment identities
US7082615B1 (en)2000-03-312006-07-25Intel CorporationProtecting software environment in isolated execution
US7089418B1 (en)2000-03-312006-08-08Intel CorporationManaging accesses in a processor for isolated execution
US7096497B2 (en)2001-03-302006-08-22Intel CorporationFile checking using remote signing authority via a network
US7103771B2 (en)2001-12-172006-09-05Intel CorporationConnecting a virtual token to a physical token
US7111176B1 (en)2000-03-312006-09-19Intel CorporationGenerating isolated bus cycles for isolated execution
US7117376B2 (en)2000-12-282006-10-03Intel CorporationPlatform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US7124327B2 (en)2002-06-292006-10-17Intel CorporationControl over faults occurring during the operation of guest software in the virtual-machine architecture
US7127548B2 (en)2002-04-162006-10-24Intel CorporationControl register access virtualization performance improvement in the virtual-machine architecture
EP1717723A1 (en)*2005-04-292006-11-02ST Incard S.r.l.Improved virtual machine or hardware processor for IC-card portable electronic devices
US7142674B2 (en)2002-06-182006-11-28Intel CorporationMethod of confirming a secure key exchange
US7165181B2 (en)2002-11-272007-01-16Intel CorporationSystem and method for establishing trust without revealing identity
US7177967B2 (en)2003-09-302007-02-13Intel CorporationChipset support for managing hardware interrupts in a virtual machine system
US7178137B1 (en)*2001-04-052007-02-13Network Appliance, Inc.Automatic verification of scheduling domain consistency
US20070038997A1 (en)*2005-08-092007-02-15Steven GrobmanExclusive access for secure audio program
US20070043896A1 (en)*2005-08-172007-02-22Burzin DaruwalaVirtualized measurement agent
US7191440B2 (en)2001-08-152007-03-13Intel CorporationTracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
US7194623B1 (en)1999-05-282007-03-20Hewlett-Packard Development Company, L.P.Data event logging in computing platform
US7194634B2 (en)2000-03-312007-03-20Intel CorporationAttestation key memory device and bus
US20070094529A1 (en)*2005-10-202007-04-26Lango Jason AMethod and apparatus for increasing throughput in a storage server
US7215781B2 (en)2000-12-222007-05-08Intel CorporationCreation and distribution of a secret value between two devices
US7237051B2 (en)2003-09-302007-06-26Intel CorporationMechanism to control hardware interrupt acknowledgement in a virtual machine system
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US20070198857A1 (en)*2003-12-222007-08-23Koninklijke Philips Electronic, N.V.Software execution protection using an active entity
US7269740B2 (en)*2001-08-012007-09-11Sas ValidyMethod to protect software against unwanted use with a “variable principle”
US7272725B2 (en)*2002-06-252007-09-18Sas ValidyMethod to protect software against unwanted use with a “temporal dissociation” principle
US7272831B2 (en)2001-03-302007-09-18Intel CorporationMethod and apparatus for constructing host processor soft devices independent of the host processor operating system
US20070220500A1 (en)*2006-03-202007-09-20Louisa SaunierComputer security method and computer system
US7287197B2 (en)2003-09-152007-10-23Intel CorporationVectoring an interrupt or exception upon resuming operation of a virtual machine
US7296267B2 (en)2002-07-122007-11-13Intel CorporationSystem and method for binding virtual machines to hardware contexts
US7302698B1 (en)1999-09-172007-11-27Hewlett-Packard Development Company, L.P.Operation of trusted state in computing platform
US20070277239A1 (en)*2001-08-012007-11-29Sas ValidyMethod to Protect Software Against Unwanted Use with a "Renaming" Principle
US7305592B2 (en)2004-06-302007-12-04Intel CorporationSupport for nested fault in a virtual machine environment
US7308576B2 (en)2001-12-312007-12-11Intel CorporationAuthenticated code module
US7313669B2 (en)2000-12-272007-12-25Intel CorporationVirtual translation lookaside buffer
US20080005320A1 (en)*2006-05-172008-01-03Lenovo (Beijing) LimitedSecure input method based on virtual machine
US7318235B2 (en)2002-12-162008-01-08Intel CorporationAttestation using both fixed token and portable token
US7318141B2 (en)2002-12-172008-01-08Intel CorporationMethods and systems to control virtual machines
US7328453B2 (en)2001-05-092008-02-05Ecd Systems, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7356817B1 (en)2000-03-312008-04-08Intel CorporationReal-time scheduling of virtual machines
US7356735B2 (en)2004-03-302008-04-08Intel CorporationProviding support for single stepping a virtual machine in a virtual machine environment
US7366305B2 (en)2003-09-302008-04-29Intel CorporationPlatform and method for establishing trust without revealing identity
WO2008056373A1 (en)*2006-11-102008-05-15M/S Trinity Future-In Pvt LtdIntelligent system to protect softwares from unauthorized duplication
US20080126766A1 (en)*2006-11-032008-05-29Saurabh ChhedaSecuring microprocessors against information leakage and physical tampering
US7389427B1 (en)2000-09-282008-06-17Intel CorporationMechanism to secure computer output from software attack using isolated execution
US20080148062A1 (en)*2006-12-142008-06-19Jan-Erik EkbergMethod for the secure storing of program state data in an electronic device
US7392415B2 (en)2002-06-262008-06-24Intel CorporationSleep protection
US7395405B2 (en)2005-01-282008-07-01Intel CorporationMethod and apparatus for supporting address translation in a virtual machine environment
US20080189579A1 (en)*2005-04-272008-08-07Hao ZhouMethod and System for a Process Monitor Using a Hardware Communication Format
US7415708B2 (en)2003-06-262008-08-19Intel CorporationVirtual machine management using processor state information
US7424709B2 (en)2003-09-152008-09-09Intel CorporationUse of multiple virtual machine monitors to handle privileged events
US20080288786A1 (en)*2004-12-202008-11-20Michael Stephen FiskeSystem with access keys
US7457951B1 (en)1999-05-282008-11-25Hewlett-Packard Development Company, L.P.Data integrity monitoring in trusted computing entity
US20080301654A1 (en)*2005-12-222008-12-04Fujitsu LimitedProgram processing apparatus, program processing method and computer readable information recording medium
US7480806B2 (en)2002-02-222009-01-20Intel CorporationMulti-token seal and unseal
US7490070B2 (en)2004-06-102009-02-10Intel CorporationApparatus and method for proving the denial of a direct proof signature
US7502943B2 (en)2003-04-182009-03-10Via Technologies, Inc.Microprocessor apparatus and method for providing configurable cryptographic block cipher round results
US7502940B2 (en)*2001-08-012009-03-10Sas ValidyMethod to protect software against unwanted use with a “conditional branch” principle
US7519833B2 (en)2003-04-182009-04-14Via Technologies, Inc.Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine
US7529367B2 (en)2003-04-182009-05-05Via Technologies, Inc.Apparatus and method for performing transparent cipher feedback mode cryptographic functions
US7529368B2 (en)2003-04-182009-05-05Via Technologies, Inc.Apparatus and method for performing transparent output feedback mode cryptographic functions
US7532722B2 (en)2003-04-182009-05-12Ip-First, LlcApparatus and method for performing transparent block cipher cryptographic functions
WO2009065997A1 (en)*2007-11-232009-05-28Nokia CorporationMethod for secure program code execution in an electronic device
US7542566B2 (en)2003-04-182009-06-02Ip-First, LlcApparatus and method for performing transparent cipher block chaining mode cryptographic functions
US20090178115A1 (en)*2004-11-182009-07-09Michael Stephen FiskeReceiving an access key
US7565697B2 (en)2000-09-222009-07-21Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US20090228714A1 (en)*2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US7610611B2 (en)2003-09-192009-10-27Moran Douglas RPrioritized address decoder
US7620949B2 (en)2004-03-312009-11-17Intel CorporationMethod and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US7631196B2 (en)2002-02-252009-12-08Intel CorporationMethod and apparatus for loading a trustable operating system
US7636844B2 (en)2003-11-172009-12-22Intel CorporationMethod and system to provide a trusted channel within a computer system for a SIM device
US20100011222A1 (en)*2004-11-182010-01-14Michael FiskeInterfacing with a system that includes a passcode authenticator
US20100064131A1 (en)*2004-02-112010-03-11Oliver SpatscheckMethod and apparatus for automatically constructing application signatures
US20100082929A1 (en)*2008-10-012010-04-01Canon Kabushiki KaishaMemory protection method, information processing apparatus, and computer-readable storage medium that stores memory protection program
US7694302B1 (en)2001-04-052010-04-06Network Appliance, Inc.Symmetric multiprocessor synchronization using migrating scheduling domains
US7707622B2 (en)2004-11-182010-04-27Biogy, Inc.API for a system having a passcode authenticator
US20100106954A1 (en)*2008-10-232010-04-29Robert Michael MuchselMulti-Layer Content Protecting Microcontroller
US7739521B2 (en)2003-09-182010-06-15Intel CorporationMethod of obscuring cryptographic computations
US7793111B1 (en)2000-09-282010-09-07Intel CorporationMechanism to handle events in a machine with isolated execution
US7802085B2 (en)2004-02-182010-09-21Intel CorporationApparatus and method for distributing private keys to an entity with minimal secret, unique information
US7809957B2 (en)2005-09-292010-10-05Intel CorporationTrusted platform module for generating sealed data
US7818808B1 (en)2000-12-272010-10-19Intel CorporationProcessor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US20100291896A1 (en)*2007-07-242010-11-18Nxp B.V.Method, system and trusted service manager for securely transmitting an application to a mobile phone
US7840962B2 (en)2004-09-302010-11-23Intel CorporationSystem and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US7877799B2 (en)2000-08-182011-01-25Hewlett-Packard Development Company, L.P.Performance of a service on a computing platform
US7886155B2 (en)2004-12-202011-02-08Biogy, Inc.System for generating requests to a passcode protected entity
US7900017B2 (en)2002-12-272011-03-01Intel CorporationMechanism for remapping post virtual machine memory pages
US7900055B2 (en)2003-04-182011-03-01Via Technologies, Inc.Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms
US8014530B2 (en)2006-03-222011-09-06Intel CorporationMethod and apparatus for authenticated, recoverable key distribution with no database secrets
US8037314B2 (en)2003-12-222011-10-11Intel CorporationReplacing blinded authentication authority
US8060755B2 (en)2003-04-182011-11-15Via Technologies, IncApparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
US8146078B2 (en)2004-10-292012-03-27Intel CorporationTimer offsetting mechanism in a virtual machine environment
US8156343B2 (en)2003-11-262012-04-10Intel CorporationAccessing private data about the state of a data processing machine from storage that is publicly accessible
US8219496B2 (en)2001-02-232012-07-10Hewlett-Packard Development Company, L.P.Method of and apparatus for ascertaining the status of a data processing environment
US8429429B1 (en)*2009-10-232013-04-23Secure Vector, Inc.Computer security system and method
US8533777B2 (en)2004-12-292013-09-10Intel CorporationMechanism to determine trust of out-of-band management agents
EP2249278A4 (en)*2007-12-292013-09-11Beijing Senselock Software Technlogy Co Ltd SOFTWARE COPYRIGHT PROCEDURE AND SYSTEM BASED ON A BREAKDOWN LOCK AND LOCKING LOCK
US8539587B2 (en)2005-03-222013-09-17Hewlett-Packard Development Company, L.P.Methods, devices and data structures for trusted data
US8543772B2 (en)2003-09-302013-09-24Intel CorporationInvalidating translation lookaside buffer entries in a virtual machine (VM) system
US8561204B1 (en)*2007-02-122013-10-15Gregory William DalcherSystem, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system
US8627331B1 (en)2010-04-302014-01-07Netapp, Inc.Multi-level parallelism of process execution in a mutual exclusion domain of a processing system
US20140019775A1 (en)*2012-07-102014-01-16Carl Marshall Eliot PowellAnti-wikileaks usb/cd device
US8775802B1 (en)2009-10-232014-07-08Secure VectorComputer security system and method
US8924728B2 (en)2004-11-302014-12-30Intel CorporationApparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20150012402A1 (en)*2013-07-032015-01-08Trading Technologies International, Inc.Trading System License Verification, Management and Control
US20150143096A1 (en)*2012-05-232015-05-21MorphoMethod and chip card for transmitting information
US9117056B2 (en)*2013-06-112015-08-25Vatari CorporationSystem and method for using digital strings to provide secure distribution of digital content
US9235393B2 (en)2002-07-092016-01-12Iii Holdings 2, LlcStatically speculative compilation and execution
US9298910B2 (en)2011-06-082016-03-29Mcafee, Inc.System and method for virtual partition monitoring
US20160182543A1 (en)*2014-12-222016-06-23Christian AabyeSoftware tampering detection and reporting process
US9454652B2 (en)2009-10-232016-09-27Secure Vector, LlcComputer security system and method
US20170026342A1 (en)*2015-07-212017-01-26Baffle, Inc.Systems and processes for executing private programs on untrusted computers
US9569186B2 (en)2003-10-292017-02-14Iii Holdings 2, LlcEnergy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
US9582650B2 (en)2003-11-172017-02-28Bluerisc, Inc.Security of program executables and microprocessors based on compiler-architecture interaction
US9633206B2 (en)2000-11-282017-04-25Hewlett-Packard Development Company, L.P.Demonstrating integrity of a compartment of a compartmented operating system
EP3244340A1 (en)*2016-05-092017-11-15Gemalto SaMethod for securely running an application
US9858434B2 (en)*2014-12-292018-01-02Brainzsquare Inc.System and method for erasing a storage medium
CN109426703A (en)*2017-08-302019-03-05武汉斗鱼网络科技有限公司Guard method and device on a kind of ios platform to core code
US10242182B2 (en)*2009-10-232019-03-26Secure Vector, LlcComputer security system and method
US10606764B1 (en)*2017-10-022020-03-31Northrop Grumman Systems CorporationFault-tolerant embedded root of trust using lockstep processor cores on an FPGA
US10901917B1 (en)*2018-01-262021-01-26Amazon Technologies, Inc.Address scrambling for storage class memory
US10904284B2 (en)*2018-09-142021-01-26International Business Machines CorporationEnabling software distribution
US20240104194A1 (en)*2020-12-172024-03-28TagesMethod for associating an executable software program with a computing platform

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1076279A1 (en)1999-08-132001-02-14Hewlett-Packard CompanyComputer platforms and their methods of operation
GB9922665D0 (en)1999-09-251999-11-24Hewlett Packard CoA method of enforcing trusted functionality in a full function platform
WO2002086684A2 (en)2001-04-242002-10-31Hewlett-Packard CompanyAn information security system
GB2392262A (en)2002-08-232004-02-25Hewlett Packard CoA method of controlling the processing of data
US7987497B1 (en)2004-03-052011-07-26Microsoft CorporationSystems and methods for data encryption using plugins within virtual systems and subsystems
US8607299B2 (en)2004-04-272013-12-10Microsoft CorporationMethod and system for enforcing a security policy via a security virtual machine
US20090125977A1 (en)*2007-10-312009-05-14Docomo Communications Laboratories Usa, Inc.Language framework and infrastructure for safe and composable applications
DE102009024985A1 (en)*2009-06-162010-12-23Giesecke & Devrient Gmbh Method of executing a bytecode in a secure runtime environment
CN103646214B (en)*2013-12-182016-08-31国家电网公司A kind of method setting up trusted context in distribution terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5103478A (en)*1989-04-271992-04-07International Business Machines CorporationSecure management of keys using control vectors with multi-path checking
US5146575A (en)*1986-11-051992-09-08International Business Machines Corp.Implementing privilege on microprocessor systems for use in software asset protection
US5991399A (en)*1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6157721A (en)*1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US6219835B1 (en)*1998-10-152001-04-17International Business Machines CorporationMulti-language DCE remote procedure call
US6378072B1 (en)*1998-02-032002-04-23Compaq Computer CorporationCryptographic system
US6496910B1 (en)*1998-06-052002-12-17International Business Machines CorporationMethod and device for loading instruction codes to a memory and linking said instruction codes
US6567917B1 (en)*1999-02-012003-05-20Cisco Technology, Inc.Method and system for providing tamper-resistant executable software
US6651171B1 (en)*1999-04-062003-11-18Microsoft CorporationSecure execution of program code

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5666516A (en)*1993-12-161997-09-09International Business Machines CorporationProtected programmable memory cartridge having selective access circuitry
US6012144A (en)*1996-10-082000-01-04Pickett; Thomas E.Transaction security method and apparatus
US6125186A (en)*1996-11-282000-09-26Fujitsu LimitedEncryption communication system using an agent and a storage medium for storing that agent

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5146575A (en)*1986-11-051992-09-08International Business Machines Corp.Implementing privilege on microprocessor systems for use in software asset protection
US5103478A (en)*1989-04-271992-04-07International Business Machines CorporationSecure management of keys using control vectors with multi-path checking
US6157721A (en)*1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US20020023214A1 (en)*1996-08-122002-02-21Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US20030041239A1 (en)*1996-08-122003-02-27Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US5991399A (en)*1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6378072B1 (en)*1998-02-032002-04-23Compaq Computer CorporationCryptographic system
US6496910B1 (en)*1998-06-052002-12-17International Business Machines CorporationMethod and device for loading instruction codes to a memory and linking said instruction codes
US6219835B1 (en)*1998-10-152001-04-17International Business Machines CorporationMulti-language DCE remote procedure call
US6567917B1 (en)*1999-02-012003-05-20Cisco Technology, Inc.Method and system for providing tamper-resistant executable software
US6651171B1 (en)*1999-04-062003-11-18Microsoft CorporationSecure execution of program code

Cited By (296)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6658571B1 (en)*1999-02-092003-12-02Secure Computing CorporationSecurity framework for dynamically wrapping software applications executing in a computing system
US7263718B2 (en)1999-02-092007-08-28Secure Computing CorporationSecurity framework for supporting kernel-based hypervisors within a computing system
US20040158720A1 (en)*1999-02-092004-08-12Secure Computing CorporationSecurity framework for supporting kernel-based hypervisors within a computing system
US7194623B1 (en)1999-05-282007-03-20Hewlett-Packard Development Company, L.P.Data event logging in computing platform
US7457951B1 (en)1999-05-282008-11-25Hewlett-Packard Development Company, L.P.Data integrity monitoring in trusted computing entity
US6470430B1 (en)*1999-06-172002-10-22Daimlerchrysler AgPartitioning and monitoring of software-controlled system
US7302698B1 (en)1999-09-172007-11-27Hewlett-Packard Development Company, L.P.Operation of trusted state in computing platform
US20060136750A1 (en)*2000-03-272006-06-22Mecrosoft CorporationProtecting Digital Goods Using Oblivious Checking
US7447912B2 (en)*2000-03-272008-11-04Microsoft CorporationProtecting digital goods using oblivious checking
US7080257B1 (en)*2000-03-272006-07-18Microsoft CorporationProtecting digital goods using oblivious checking
US6934817B2 (en)2000-03-312005-08-23Intel CorporationControlling access to multiple memory zones in an isolated execution environment
US6769058B1 (en)2000-03-312004-07-27Intel CorporationResetting a processor in an isolated execution environment
US7082615B1 (en)2000-03-312006-07-25Intel CorporationProtecting software environment in isolated execution
US7073071B1 (en)2000-03-312006-07-04Intel CorporationPlatform and method for generating and utilizing a protected audit log
US7089418B1 (en)2000-03-312006-08-08Intel CorporationManaging accesses in a processor for isolated execution
US7111176B1 (en)2000-03-312006-09-19Intel CorporationGenerating isolated bus cycles for isolated execution
US6678825B1 (en)2000-03-312004-01-13Intel CorporationControlling access to multiple isolated memories in an isolated execution environment
US7194634B2 (en)2000-03-312007-03-20Intel CorporationAttestation key memory device and bus
US6754815B1 (en)2000-03-312004-06-22Intel CorporationMethod and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
US7013484B1 (en)2000-03-312006-03-14Intel CorporationManaging a secure environment using a chipset in isolated execution mode
US6760441B1 (en)2000-03-312004-07-06Intel CorporationGenerating a key hieararchy for use in an isolated execution environment
US6941458B1 (en)2000-03-312005-09-06Intel CorporationManaging a secure platform using a hierarchical executive architecture in isolated execution mode
US6507904B1 (en)2000-03-312003-01-14Intel CorporationExecuting isolated mode instructions in a secure system running in privilege rings
US7013481B1 (en)2000-03-312006-03-14Intel CorporationAttestation key memory device and bus
US6996710B1 (en)2000-03-312006-02-07Intel CorporationPlatform and method for issuing and certifying a hardware-protected attestation key
US7356817B1 (en)2000-03-312008-04-08Intel CorporationReal-time scheduling of virtual machines
US6990579B1 (en)2000-03-312006-01-24Intel CorporationPlatform and method for remote attestation of a platform
US6957332B1 (en)2000-03-312005-10-18Intel CorporationManaging a secure platform using a hierarchical executive architecture in isolated execution mode
US6976162B1 (en)2000-06-282005-12-13Intel CorporationPlatform and method for establishing provable identities while maintaining privacy
US7516330B2 (en)2000-06-282009-04-07Intel CorporationPlatform and method for establishing provable identities while maintaining privacy
US7877799B2 (en)2000-08-182011-01-25Hewlett-Packard Development Company, L.P.Performance of a service on a computing platform
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US7565697B2 (en)2000-09-222009-07-21Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US20070199074A1 (en)*2000-09-222007-08-23Ecd SystemsSystems and methods for preventing unauthorized use of digital content
US8261359B2 (en)2000-09-222012-09-04Sca Ipla Holdings Inc.Systems and methods for preventing unauthorized use of digital content
US7793111B1 (en)2000-09-282010-09-07Intel CorporationMechanism to handle events in a machine with isolated execution
US8671275B2 (en)2000-09-282014-03-11Intel CorporationMechanism to handle events in a machine with isolated execution
US8522044B2 (en)2000-09-282013-08-27Intel CorporationMechanism to handle events in a machine with isolated execution
US7389427B1 (en)2000-09-282008-06-17Intel CorporationMechanism to secure computer output from software attack using isolated execution
US20020120578A1 (en)*2000-11-222002-08-29Sy Bon K.Time-based software licensing approach
US7231360B2 (en)*2000-11-222007-06-12Sy Bon KTime-based software licensing approach
US9633206B2 (en)2000-11-282017-04-25Hewlett-Packard Development Company, L.P.Demonstrating integrity of a compartment of a compartmented operating system
US7215781B2 (en)2000-12-222007-05-08Intel CorporationCreation and distribution of a secret value between two devices
US7020738B2 (en)2000-12-272006-03-28Intel CorporationMethod for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7818808B1 (en)2000-12-272010-10-19Intel CorporationProcessor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor
US7313669B2 (en)2000-12-272007-12-25Intel CorporationVirtual translation lookaside buffer
US7035963B2 (en)2000-12-272006-04-25Intel CorporationMethod for resolving address space conflicts between a virtual machine monitor and a guest operating system
US7117376B2 (en)2000-12-282006-10-03Intel CorporationPlatform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US20020124052A1 (en)*2001-02-172002-09-05Richard BrownSecure e-mail handling using a compartmented operating system
US8219496B2 (en)2001-02-232012-07-10Hewlett-Packard Development Company, L.P.Method of and apparatus for ascertaining the status of a data processing environment
US8218765B2 (en)2001-02-232012-07-10Hewlett-Packard Development Company, L.P.Information system
US20020119427A1 (en)*2001-02-232002-08-29Hewlett-Packard CompanyTrusted computing environment
US20020120862A1 (en)*2001-02-232002-08-29Hewlett-Packard CompanyInformation system
US7353531B2 (en)2001-02-232008-04-01Hewlett-Packard Development Company L.P.Trusted computing environment
US7272831B2 (en)2001-03-302007-09-18Intel CorporationMethod and apparatus for constructing host processor soft devices independent of the host processor operating system
US7096497B2 (en)2001-03-302006-08-22Intel CorporationFile checking using remote signing authority via a network
US7178137B1 (en)*2001-04-052007-02-13Network Appliance, Inc.Automatic verification of scheduling domain consistency
US7694302B1 (en)2001-04-052010-04-06Network Appliance, Inc.Symmetric multiprocessor synchronization using migrating scheduling domains
US8117667B2 (en)2001-05-092012-02-14Sca Ipla Holdings Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7328453B2 (en)2001-05-092008-02-05Ecd Systems, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US8844048B2 (en)2001-05-092014-09-23Sca Ipla Holdings Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20020188859A1 (en)*2001-06-072002-12-12Dollens James TerryDNA intrusion detection method
US7159210B2 (en)*2001-06-192007-01-02Hewlett-Packard Development Company, L.P.Performing secure and insecure computing operations in a compartmented operating system
US7865876B2 (en)*2001-06-192011-01-04Hewlett-Packard Development Company, L.P.Multiple trusted computing environments
US20020194132A1 (en)*2001-06-192002-12-19Hewlett-Packard CompanyRenting a computing environment on a trusted computing platform
US20020194241A1 (en)*2001-06-192002-12-19Jonathan GriffinPerforming secure and insecure computing operations in a compartmented operating system
US20020194496A1 (en)*2001-06-192002-12-19Jonathan GriffinMultiple trusted computing environments
US7076655B2 (en)2001-06-192006-07-11Hewlett-Packard Development Company, L.P.Multiple trusted computing environments with verifiable environment identities
US20030041255A1 (en)*2001-07-312003-02-27Liqun ChenMethod and apparatus for locking an application within a trusted environment
US7502940B2 (en)*2001-08-012009-03-10Sas ValidyMethod to protect software against unwanted use with a “conditional branch” principle
US7343494B2 (en)*2001-08-012008-03-11Sas ValidyMethod to protect software against unwanted use with a “renaming” principle
US7434064B2 (en)*2001-08-012008-10-07Sas ValidyMethod to protect software against unwanted use with a “elementary functions” principle
US7269740B2 (en)*2001-08-012007-09-11Sas ValidyMethod to protect software against unwanted use with a “variable principle”
US20070277239A1 (en)*2001-08-012007-11-29Sas ValidyMethod to Protect Software Against Unwanted Use with a "Renaming" Principle
US20030028788A1 (en)*2001-08-012003-02-06Cuenod Jean-Christophe EmanuelMethod to protect software against unwanted use with a " elementary functions " principle
US20070294770A1 (en)*2001-08-012007-12-20Sas ValidyMethod to Protect Software Against Unwanted Use with a Variable Principle
US7191440B2 (en)2001-08-152007-03-13Intel CorporationTracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor
WO2003027800A3 (en)*2001-09-242003-07-31Motorola IncMethod and apparatus for secure mobile transaction
US7921293B2 (en)2001-11-012011-04-05Intel CorporationApparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7024555B2 (en)2001-11-012006-04-04Intel CorporationApparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
US7467370B2 (en)2001-11-222008-12-16Hewlett-Packard Development Company, L.P.Apparatus and method for creating a trusted environment
US20050223221A1 (en)*2001-11-222005-10-06Proudler Graeme JApparatus and method for creating a trusted environment
US7376974B2 (en)2001-11-222008-05-20Hewlett-Packard Development Company, L.P.Apparatus and method for creating a trusted environment
US7346781B2 (en)*2001-12-062008-03-18Mcafee, Inc.Initiating execution of a computer program from an encrypted version of a computer program
US20030110387A1 (en)*2001-12-062003-06-12Cowie Neil AndrewInitiating execution of a computer program from an encrypted version of a computer program
US7103771B2 (en)2001-12-172006-09-05Intel CorporationConnecting a virtual token to a physical token
US7308576B2 (en)2001-12-312007-12-11Intel CorporationAuthenticated code module
US7480806B2 (en)2002-02-222009-01-20Intel CorporationMulti-token seal and unseal
US8386788B2 (en)2002-02-252013-02-26Intel CorporationMethod and apparatus for loading a trustable operating system
US8407476B2 (en)2002-02-252013-03-26Intel CorporationMethod and apparatus for loading a trustable operating system
US7631196B2 (en)2002-02-252009-12-08Intel CorporationMethod and apparatus for loading a trustable operating system
US9361121B2 (en)2002-03-292016-06-07Intel CorporationSystem and method for execution of a secured environment initialization instruction
US10031759B2 (en)2002-03-292018-07-24Intel CorporationSystem and method for execution of a secured environment initialization instruction
US8185734B2 (en)2002-03-292012-05-22Intel CorporationSystem and method for execution of a secured environment initialization instruction
US7069442B2 (en)2002-03-292006-06-27Intel CorporationSystem and method for execution of a secured environment initialization instruction
US8645688B2 (en)2002-03-292014-02-04Intel CorporationSystem and method for execution of a secured environment initialization instruction
US7028149B2 (en)2002-03-292006-04-11Intel CorporationSystem and method for resetting a platform configuration register
US7546457B2 (en)2002-03-292009-06-09Intel CorporationSystem and method for execution of a secured environment initialization instruction
US9990208B2 (en)2002-03-292018-06-05Intel CorporationSystem and method for execution of a secured environment initialization instruction
US10175994B2 (en)2002-03-292019-01-08Intel CorporationSystem and method for execution of a secured environment initialization instruction
US10042649B2 (en)2002-03-292018-08-07Intel CorporationSystem and method for execution of a secured environment initialization instruction
US20030221116A1 (en)*2002-04-152003-11-27Core Sdi, IncorporatedSecurity framework for protecting rights in computer software
US7058807B2 (en)2002-04-152006-06-06Intel CorporationValidation of inclusion of a platform within a data center
US7549147B2 (en)2002-04-152009-06-16Core Sdi, IncorporatedSecurity framework for protecting rights in computer software
WO2003090021A3 (en)*2002-04-152004-05-21Core Sdi IncSecurity framework for protecting rights in computer software
US7076669B2 (en)2002-04-152006-07-11Intel CorporationMethod and apparatus for communicating securely with a token
US7127548B2 (en)2002-04-162006-10-24Intel CorporationControl register access virtualization performance improvement in the virtual-machine architecture
US6820177B2 (en)2002-06-122004-11-16Intel CorporationProtected configuration space in a protected environment
US7366849B2 (en)2002-06-122008-04-29Intel CorporationProtected configuration space in a protected environment
US7142674B2 (en)2002-06-182006-11-28Intel CorporationMethod of confirming a secure key exchange
US20070283437A1 (en)*2002-06-252007-12-06Sas ValidyMethod to Protect Software Against Unwanted Use with a "Temporal Dissociation" Principle
US7272725B2 (en)*2002-06-252007-09-18Sas ValidyMethod to protect software against unwanted use with a “temporal dissociation” principle
US7392415B2 (en)2002-06-262008-06-24Intel CorporationSleep protection
US6996748B2 (en)2002-06-292006-02-07Intel CorporationHandling faults associated with operation of guest software in the virtual-machine architecture
US7124327B2 (en)2002-06-292006-10-17Intel CorporationControl over faults occurring during the operation of guest software in the virtual-machine architecture
US9235393B2 (en)2002-07-092016-01-12Iii Holdings 2, LlcStatically speculative compilation and execution
US10101978B2 (en)2002-07-092018-10-16Iii Holdings 2, LlcStatically speculative compilation and execution
US7296267B2 (en)2002-07-122007-11-13Intel CorporationSystem and method for binding virtual machines to hardware contexts
US7165181B2 (en)2002-11-272007-01-16Intel CorporationSystem and method for establishing trust without revealing identity
US7454611B2 (en)2002-11-272008-11-18Intel CorporationSystem and method for establishing trust without revealing identity
WO2004051482A3 (en)*2002-12-042004-11-25Philips Intellectual PropertyAddress encryption method for flash memories
US7640437B2 (en)2002-12-042009-12-29Nxp B.V.Address encryption method for flash memories
US7073042B2 (en)2002-12-122006-07-04Intel CorporationReclaiming existing fields in address translation data structures to extend control over memory accesses
US7318235B2 (en)2002-12-162008-01-08Intel CorporationAttestation using both fixed token and portable token
US7318141B2 (en)2002-12-172008-01-08Intel CorporationMethods and systems to control virtual machines
US20040123288A1 (en)*2002-12-192004-06-24Intel CorporationMethods and systems to manage machine state in virtual machine operations
US7900017B2 (en)2002-12-272011-03-01Intel CorporationMechanism for remapping post virtual machine memory pages
US8195914B2 (en)2002-12-272012-06-05Intel CorporationMechanism for remapping post virtual machine memory pages
US7539876B2 (en)2003-04-182009-05-26Via Technologies, Inc.Apparatus and method for generating a cryptographic key schedule in a microprocessor
US7900055B2 (en)2003-04-182011-03-01Via Technologies, Inc.Microprocessor apparatus and method for employing configurable block cipher cryptographic algorithms
US7392400B2 (en)2003-04-182008-06-24Via Technologies, Inc.Microprocessor apparatus and method for optimizing block cipher cryptographic functions
US20040255130A1 (en)*2003-04-182004-12-16Via Technologies Inc.Microprocessor apparatus and method for providing configurable cryptographic key size
US20040250091A1 (en)*2003-04-182004-12-09Via Technologies Inc.Microprocessor apparatus and method for optimizing block cipher cryptographic functions
US20040250090A1 (en)*2003-04-182004-12-09Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic fuctions
US8060755B2 (en)2003-04-182011-11-15Via Technologies, IncApparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
US7844053B2 (en)2003-04-182010-11-30Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic functions
US20040228479A1 (en)*2003-04-182004-11-18Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic functions
US7502943B2 (en)2003-04-182009-03-10Via Technologies, Inc.Microprocessor apparatus and method for providing configurable cryptographic block cipher round results
US7925891B2 (en)2003-04-182011-04-12Via Technologies, Inc.Apparatus and method for employing cryptographic functions to generate a message digest
US7542566B2 (en)2003-04-182009-06-02Ip-First, LlcApparatus and method for performing transparent cipher block chaining mode cryptographic functions
US7321910B2 (en)2003-04-182008-01-22Ip-First, LlcMicroprocessor apparatus and method for performing block cipher cryptographic functions
US7536560B2 (en)2003-04-182009-05-19Via Technologies, Inc.Microprocessor apparatus and method for providing configurable cryptographic key size
US7532722B2 (en)2003-04-182009-05-12Ip-First, LlcApparatus and method for performing transparent block cipher cryptographic functions
US7529368B2 (en)2003-04-182009-05-05Via Technologies, Inc.Apparatus and method for performing transparent output feedback mode cryptographic functions
US7519833B2 (en)2003-04-182009-04-14Via Technologies, Inc.Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine
US20040208072A1 (en)*2003-04-182004-10-21Via Technologies Inc.Microprocessor apparatus and method for providing configurable cryptographic key size
US7529367B2 (en)2003-04-182009-05-05Via Technologies, Inc.Apparatus and method for performing transparent cipher feedback mode cryptographic functions
US7415708B2 (en)2003-06-262008-08-19Intel CorporationVirtual machine management using processor state information
US8296762B2 (en)2003-06-262012-10-23Intel CorporationVirtual machine management using processor state information
US20050039080A1 (en)*2003-08-152005-02-17Wenzel Harold MichaelMethod and system for containing software faults
US7134050B2 (en)*2003-08-152006-11-07Hewlett-Packard Development Company, L.P.Method and system for containing software faults
US7287197B2 (en)2003-09-152007-10-23Intel CorporationVectoring an interrupt or exception upon resuming operation of a virtual machine
US7424709B2 (en)2003-09-152008-09-09Intel CorporationUse of multiple virtual machine monitors to handle privileged events
US7739521B2 (en)2003-09-182010-06-15Intel CorporationMethod of obscuring cryptographic computations
US7610611B2 (en)2003-09-192009-10-27Moran Douglas RPrioritized address decoder
US7302511B2 (en)2003-09-302007-11-27Intel CorporationChipset support for managing hardware interrupts in a virtual machine system
US7366305B2 (en)2003-09-302008-04-29Intel CorporationPlatform and method for establishing trust without revealing identity
US8751752B2 (en)2003-09-302014-06-10Intel CorporationInvalidating translation lookaside buffer entries in a virtual machine system
US8543772B2 (en)2003-09-302013-09-24Intel CorporationInvalidating translation lookaside buffer entries in a virtual machine (VM) system
US7177967B2 (en)2003-09-302007-02-13Intel CorporationChipset support for managing hardware interrupts in a virtual machine system
US7237051B2 (en)2003-09-302007-06-26Intel CorporationMechanism to control hardware interrupt acknowledgement in a virtual machine system
US9569186B2 (en)2003-10-292017-02-14Iii Holdings 2, LlcEnergy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
US10248395B2 (en)2003-10-292019-04-02Iii Holdings 2, LlcEnergy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
US7636844B2 (en)2003-11-172009-12-22Intel CorporationMethod and system to provide a trusted channel within a computer system for a SIM device
US9582650B2 (en)2003-11-172017-02-28Bluerisc, Inc.Security of program executables and microprocessors based on compiler-architecture interaction
US9087000B2 (en)2003-11-262015-07-21Intel CorporationAccessing private data about the state of a data processing machine from storage that is publicly accessible
US20090138731A1 (en)*2003-11-262009-05-28International Business Machines Corporation Tamper-Resistant Trusted JAVA Virtual Machine And Method Of Using The Same
WO2005052841A3 (en)*2003-11-262005-08-11IbmTamper-resistant trusted virtual machine
US9348767B2 (en)2003-11-262016-05-24Intel CorporationAccessing private data about the state of a data processing machine from storage that is publicly accessible
US7747877B2 (en)2003-11-262010-06-29International Business Machines CorporationTamper-resistant trusted Java virtual machine and method of using the same
US8156343B2 (en)2003-11-262012-04-10Intel CorporationAccessing private data about the state of a data processing machine from storage that is publicly accessible
US9009483B2 (en)2003-12-222015-04-14Intel CorporationReplacing blinded authentication authority
US20070198857A1 (en)*2003-12-222007-08-23Koninklijke Philips Electronic, N.V.Software execution protection using an active entity
US8037314B2 (en)2003-12-222011-10-11Intel CorporationReplacing blinded authentication authority
US8171480B2 (en)2004-01-272012-05-01Network Appliance, Inc.Method and apparatus for allocating shared resources to process domains according to current processor utilization in a shared resource processor
US20050172293A1 (en)*2004-01-272005-08-04Network Appliance, Inc.Method and apparatus for allocating resources in a shared resource processor
US20100064131A1 (en)*2004-02-112010-03-11Oliver SpatscheckMethod and apparatus for automatically constructing application signatures
US20050182930A1 (en)*2004-02-182005-08-18AlcatelMethod and a device for transforming an operating system to protect a computer program against attack
US8639915B2 (en)2004-02-182014-01-28Intel CorporationApparatus and method for distributing private keys to an entity with minimal secret, unique information
US7802085B2 (en)2004-02-182010-09-21Intel CorporationApparatus and method for distributing private keys to an entity with minimal secret, unique information
US20050216749A1 (en)*2004-03-232005-09-29Network Equipment TechnologiesMethod and apparatus for detection of hostile software
US7669059B2 (en)*2004-03-232010-02-23Network Equipment Technologies, Inc.Method and apparatus for detection of hostile software
US20050216414A1 (en)*2004-03-252005-09-29Nec CorporationSoftware use permission method and system
US7610632B2 (en)*2004-03-252009-10-27Nec CorporationSoftware use permission method and system
US7356735B2 (en)2004-03-302008-04-08Intel CorporationProviding support for single stepping a virtual machine in a virtual machine environment
US7620949B2 (en)2004-03-312009-11-17Intel CorporationMethod and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
US7861245B2 (en)2004-03-312010-12-28Intel CorporationMethod and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment
WO2005109145A1 (en)*2004-04-302005-11-17Siemens AktiengesellschaftMethod for preventing a software application or data from being read out of a mobile communication appliance
EP1596530A1 (en)*2004-05-142005-11-16Via Technologies, Inc.Apparatus and method for employing cryptographic functions to generate a message digest
US8006100B2 (en)*2004-06-102011-08-23Oracle America, Inc.Enhancing trusted platform module performance
US20060005000A1 (en)*2004-06-102006-01-05Sun Microsystems, Inc.Enhancing trusted platform module performance
US7490070B2 (en)2004-06-102009-02-10Intel CorporationApparatus and method for proving the denial of a direct proof signature
US7305592B2 (en)2004-06-302007-12-04Intel CorporationSupport for nested fault in a virtual machine environment
US20060095977A1 (en)*2004-08-252006-05-04Samsung Electronics Co., Ltd.Software protecting method and apparatus using the same
US20060075254A1 (en)*2004-09-272006-04-06Cisco Technology, Inc. (A California Corporation)Smart card functionality from a security co-processor and symmetric key in ROM
US7840962B2 (en)2004-09-302010-11-23Intel CorporationSystem and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time
US8146078B2 (en)2004-10-292012-03-27Intel CorporationTimer offsetting mechanism in a virtual machine environment
US20060099991A1 (en)*2004-11-102006-05-11Intel CorporationMethod and apparatus for detecting and protecting a credential card
US20060107312A1 (en)*2004-11-182006-05-18Michael FiskeSystem for handing requests for access to a passcode protected entity
US7669236B2 (en)2004-11-182010-02-23Biogy, Inc.Determining whether to grant access to a passcode protected system
US8209751B2 (en)2004-11-182012-06-26Biogy, Inc.Receiving an access key
US20060107068A1 (en)*2004-11-182006-05-18Michael FiskeMethod of generating access keys
US20060107040A1 (en)*2004-11-182006-05-18Michael FiskeSetting up a security access system
US7979716B2 (en)*2004-11-182011-07-12Biogy, Inc.Method of generating access keys
US20100011222A1 (en)*2004-11-182010-01-14Michael FiskeInterfacing with a system that includes a passcode authenticator
US7770018B2 (en)2004-11-182010-08-03Biogy, Inc.Setting up a security access system
US20060107315A1 (en)*2004-11-182006-05-18Michael FiskeSystem that uses access keys
US20090178115A1 (en)*2004-11-182009-07-09Michael Stephen FiskeReceiving an access key
US7702911B2 (en)2004-11-182010-04-20Biogy, Inc.Interfacing with a system that includes a passcode authenticator
US7707622B2 (en)2004-11-182010-04-27Biogy, Inc.API for a system having a passcode authenticator
US20060107316A1 (en)*2004-11-182006-05-18Michael FiskeDetermining whether to grant access to a passcode protected system
US20090228714A1 (en)*2004-11-182009-09-10Biogy, Inc.Secure mobile device with online vault
US7457960B2 (en)*2004-11-302008-11-25Analog Devices, Inc.Programmable processor supporting secure mode
US20060130130A1 (en)*2004-11-302006-06-15Joshua KablotskyProgrammable processor supporting secure mode
US8924728B2 (en)2004-11-302014-12-30Intel CorporationApparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20080288786A1 (en)*2004-12-202008-11-20Michael Stephen FiskeSystem with access keys
US7886155B2 (en)2004-12-202011-02-08Biogy, Inc.System for generating requests to a passcode protected entity
US8533777B2 (en)2004-12-292013-09-10Intel CorporationMechanism to determine trust of out-of-band management agents
US7836275B2 (en)2005-01-282010-11-16Intel CorporationMethod and apparatus for supporting address translation in a virtual machine environment
US7395405B2 (en)2005-01-282008-07-01Intel CorporationMethod and apparatus for supporting address translation in a virtual machine environment
US8539587B2 (en)2005-03-222013-09-17Hewlett-Packard Development Company, L.P.Methods, devices and data structures for trusted data
US7996721B2 (en)*2005-04-272011-08-09Intel CorporationMethod and system for a process monitor using a hardware communication format
US20080189579A1 (en)*2005-04-272008-08-07Hao ZhouMethod and System for a Process Monitor Using a Hardware Communication Format
US20080276100A1 (en)*2005-04-292008-11-06Francesco VaroneVirtual Machine or Hardware Processor for Ic-Card Portable Electronic Devices
US8745407B2 (en)2005-04-292014-06-03Stmicroelectronics N.V.Virtual machine or hardware processor for IC-card portable electronic devices
WO2007000207A1 (en)*2005-04-292007-01-04Incard SaImproved virtual machine or hardware processor for ic-card portable electronic devices
EP1717723A1 (en)*2005-04-292006-11-02ST Incard S.r.l.Improved virtual machine or hardware processor for IC-card portable electronic devices
US7971057B2 (en)*2005-08-092011-06-28Intel CorporationExclusive access for secure audio program
US20070038997A1 (en)*2005-08-092007-02-15Steven GrobmanExclusive access for secure audio program
US20100192150A1 (en)*2005-08-092010-07-29Steven GrobmanExclusive access for secure audio program
US7752436B2 (en)*2005-08-092010-07-06Intel CorporationExclusive access for secure audio program
US7827550B2 (en)*2005-08-172010-11-02Intel CorporationMethod and system for measuring a program using a measurement agent
US20070043896A1 (en)*2005-08-172007-02-22Burzin DaruwalaVirtualized measurement agent
US7809957B2 (en)2005-09-292010-10-05Intel CorporationTrusted platform module for generating sealed data
US8347293B2 (en)2005-10-202013-01-01Network Appliance, Inc.Mutual exclusion domains to perform file system processes on stripes
US20070094529A1 (en)*2005-10-202007-04-26Lango Jason AMethod and apparatus for increasing throughput in a storage server
US20080301654A1 (en)*2005-12-222008-12-04Fujitsu LimitedProgram processing apparatus, program processing method and computer readable information recording medium
US8051299B2 (en)*2006-03-202011-11-01Hewlett-Packard Development Company, L.P.Computer security method and computer system
US20070220500A1 (en)*2006-03-202007-09-20Louisa SaunierComputer security method and computer system
US8014530B2 (en)2006-03-222011-09-06Intel CorporationMethod and apparatus for authenticated, recoverable key distribution with no database secrets
US8122518B2 (en)*2006-05-172012-02-21Lenovo (Beijing) LimitedSecure input method based on virtual machine
US20080005320A1 (en)*2006-05-172008-01-03Lenovo (Beijing) LimitedSecure input method based on virtual machine
US20080126766A1 (en)*2006-11-032008-05-29Saurabh ChhedaSecuring microprocessors against information leakage and physical tampering
US9940445B2 (en)2006-11-032018-04-10Bluerisc, Inc.Securing microprocessors against information leakage and physical tampering
US11163857B2 (en)2006-11-032021-11-02Bluerisc, Inc.Securing microprocessors against information leakage and physical tampering
US10430565B2 (en)2006-11-032019-10-01Bluerisc, Inc.Securing microprocessors against information leakage and physical tampering
US20130151865A1 (en)*2006-11-032013-06-13Bluerisc Inc.Securing microprocessors against information leakage and physical tampering
US9069938B2 (en)*2006-11-032015-06-30Bluerisc, Inc.Securing microprocessors against information leakage and physical tampering
WO2008056373A1 (en)*2006-11-102008-05-15M/S Trinity Future-In Pvt LtdIntelligent system to protect softwares from unauthorized duplication
US20080148062A1 (en)*2006-12-142008-06-19Jan-Erik EkbergMethod for the secure storing of program state data in an electronic device
US8495383B2 (en)2006-12-142013-07-23Nokia CorporationMethod for the secure storing of program state data in an electronic device
US8887302B2 (en)2007-02-122014-11-11Mcafee, Inc.System, method and computer program product for utilizing code stored in a protected area of memory for securing an associated system
US8561204B1 (en)*2007-02-122013-10-15Gregory William DalcherSystem, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system
US8391837B2 (en)*2007-07-242013-03-05Nxp B.V.Method, system and trusted service manager for securely transmitting an application to a mobile phone
US20100291896A1 (en)*2007-07-242010-11-18Nxp B.V.Method, system and trusted service manager for securely transmitting an application to a mobile phone
US8601285B2 (en)*2007-11-232013-12-03Nokia CorporationMethod for secure program code execution in an electronic device
US20100262841A1 (en)*2007-11-232010-10-14Nokia CorporationMethod for secure program code execution in an electronic device
WO2009065997A1 (en)*2007-11-232009-05-28Nokia CorporationMethod for secure program code execution in an electronic device
EP2249278A4 (en)*2007-12-292013-09-11Beijing Senselock Software Technlogy Co Ltd SOFTWARE COPYRIGHT PROCEDURE AND SYSTEM BASED ON A BREAKDOWN LOCK AND LOCKING LOCK
US20100082929A1 (en)*2008-10-012010-04-01Canon Kabushiki KaishaMemory protection method, information processing apparatus, and computer-readable storage medium that stores memory protection program
US9311255B2 (en)2008-10-232016-04-12Maxim Integrated Products, Inc.Multi-layer content protecting microcontroller
US20100106954A1 (en)*2008-10-232010-04-29Robert Michael MuchselMulti-Layer Content Protecting Microcontroller
US8555015B2 (en)*2008-10-232013-10-08Maxim Integrated Products, Inc.Multi-layer content protecting microcontroller
US8429429B1 (en)*2009-10-232013-04-23Secure Vector, Inc.Computer security system and method
US20170011218A1 (en)*2009-10-232017-01-12James B. KargmanComputer security system and method
US9454652B2 (en)2009-10-232016-09-27Secure Vector, LlcComputer security system and method
US10242182B2 (en)*2009-10-232019-03-26Secure Vector, LlcComputer security system and method
US8775802B1 (en)2009-10-232014-07-08Secure VectorComputer security system and method
US8627331B1 (en)2010-04-302014-01-07Netapp, Inc.Multi-level parallelism of process execution in a mutual exclusion domain of a processing system
US9071622B2 (en)2010-04-302015-06-30Netapp, Inc.Multi-level parallelism of process execution in a mutual exclusion domain of a processing system
US10032024B2 (en)2011-06-082018-07-24Mcafee, LlcSystem and method for virtual partition monitoring
US9298910B2 (en)2011-06-082016-03-29Mcafee, Inc.System and method for virtual partition monitoring
US9547498B2 (en)*2012-05-232017-01-17MorphoMethod and chip card for transmitting information
US20150143096A1 (en)*2012-05-232015-05-21MorphoMethod and chip card for transmitting information
US20140019775A1 (en)*2012-07-102014-01-16Carl Marshall Eliot PowellAnti-wikileaks usb/cd device
US9361483B2 (en)*2012-07-102016-06-07Forcepoint Federal LlcAnti-wikileaks USB/CD device
US9117056B2 (en)*2013-06-112015-08-25Vatari CorporationSystem and method for using digital strings to provide secure distribution of digital content
US20150012402A1 (en)*2013-07-032015-01-08Trading Technologies International, Inc.Trading System License Verification, Management and Control
US20190098030A1 (en)*2014-12-222019-03-28Christian AabyeSoftware tampering detection and reporting process
US20160182543A1 (en)*2014-12-222016-06-23Christian AabyeSoftware tampering detection and reporting process
US10182062B2 (en)*2014-12-222019-01-15Visa International Service AssociationSoftware tampering detection and reporting process
WO2016106330A1 (en)*2014-12-222016-06-30Visa International Service AssociationSoftware tampering detection and reporting process
US10547625B2 (en)*2014-12-222020-01-28Visa International Service AssociationSoftware tampering detection and reporting process
CN107111694A (en)*2014-12-222017-08-29维萨国际服务协会Software tampering detection and reporting process
RU2705019C2 (en)*2014-12-222019-11-01Виза Интернэшнл Сервис АссосиэйшнMethod of detecting unauthorized access to software and notification thereof
US9858434B2 (en)*2014-12-292018-01-02Brainzsquare Inc.System and method for erasing a storage medium
US10652216B2 (en)*2015-07-212020-05-12Baffle, Inc.Systems and processes for executing private programs on untrusted computers
US20170026342A1 (en)*2015-07-212017-01-26Baffle, Inc.Systems and processes for executing private programs on untrusted computers
US10110566B2 (en)*2015-07-212018-10-23Baffle, Inc.Systems and processes for executing private programs on untrusted computers
US20190044915A1 (en)*2015-07-212019-02-07Baffle, Inc.Systems And Processes For Executing Private Programs On Untrusted Computers
EP3244340A1 (en)*2016-05-092017-11-15Gemalto SaMethod for securely running an application
CN109426703A (en)*2017-08-302019-03-05武汉斗鱼网络科技有限公司Guard method and device on a kind of ios platform to core code
US10606764B1 (en)*2017-10-022020-03-31Northrop Grumman Systems CorporationFault-tolerant embedded root of trust using lockstep processor cores on an FPGA
US10901917B1 (en)*2018-01-262021-01-26Amazon Technologies, Inc.Address scrambling for storage class memory
US10904284B2 (en)*2018-09-142021-01-26International Business Machines CorporationEnabling software distribution
US20240104194A1 (en)*2020-12-172024-03-28TagesMethod for associating an executable software program with a computing platform

Also Published As

Publication numberPublication date
WO2001065366A1 (en)2001-09-07
AU2001243365A1 (en)2001-09-12

Similar Documents

PublicationPublication DateTitle
US20010037450A1 (en)System and method for process protection
WhiteABYSS: ATrusted Architecture for Software Protection
EP0689702B1 (en)A secure application card for sharing application data and procedures among a plurality of microprocessors
US4916738A (en)Remote access terminal security
US5109413A (en)Manipulating rights-to-execute in connection with a software copy protection mechanism
White et al.ABYSS: An architecture for software protection
US4796181A (en)Billing system for computer software
US7010684B2 (en)Method and apparatus for authenticating an open system application to a portable IC device
US4817140A (en)Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US7139915B2 (en)Method and apparatus for authenticating an open system application to a portable IC device
US5047928A (en)Billing system for computer software
US6749115B2 (en)Dual processor trusted computing environment
US6871192B2 (en)System and method for preventing unauthorized use of protected software utilizing a portable security device
EP0268139A2 (en)Manipulating rights-to-execute in connection with a software copy protection mechanism
US20050108532A1 (en)Method and system to provide a trusted channel within a computer system for a SIM device
CN101176100A (en)Methods and apparatus for generating endorsement credentials for software-based security coprocessors
EP0266748B1 (en)A software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
WO2004006075A1 (en)Open type general-purpose attack-resistant cpu, and application system thereof
CN107832589B (en)Software copyright protection method and system
US6665797B1 (en)Protection of software again against unauthorized use
WO1997025675A1 (en)A secure pay-as-you-use system for computer software
JP2002518727A (en) How to control the execution of software products
US20190044709A1 (en)Incorporating software date information into a key exchange protocol to reduce software tampering
JP4454280B2 (en) License authentication method and license authentication system
JP2009064126A (en)Ic card system, terminal device therefor and program

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp